Short Summary: In this 12-minute podcast, Chris Noell, TruArx EVP of Product Management, discusses the five most common pitfalls when managing a successful and effective compliance program.
Recorded: 7 April 2010
Presenting: Michael Rasmussen, Corporate Integrity; Chris Meritt, Lumension
Safeguarding electronic protected health information (ePHI) has proved quite challenging for many healthcare organizations. In fact, 80 percent of responding healthcare organizations had experienced at least one incident of lost or stolen electronic health information in the past year*.
When: Jun 04 2010 8:00 am
Presenting: Sebastien Giora, French Chapter Leader, OWASP
The OWASP Top Ten provides a powerful awareness document for web application security. The OWASP Top Ten represents a broad consensus about what the most critical web application security flaws are.
When: Jun 03 2010 2:00 pm
Presenting: Dow A. Williamson; SCIPP International, Executive Director, CISSP, CSSLP
From "start-up" through "acquisition & development", "implementation", and "operations & maintenance" to "decommissioning", it's far too easy to lay the responsibility for the secure software life cycle at the feet of the application developers.
When: Jun 03 2010 12:00 pm
Presenting: Michael Coates; Mozilla, Web Security Engineer
Michael has extensive experience in application security, security code review and penetration assessments. He has conducted numerous security assessments for financial, enterprise and cellular customers world-wide.
When: Jun 03 2010 4:00 am
Presenting: Justin Clarke, UK Chapter Leader, OWASP
One of the core difficulties in ensuring your organisation's software development process (whether in-house or outsourced) builds in an appropriate level of security is a lack of research, standards and accepted practice in this area.
When: May 27 2010 4:00 pm
Presenting: Doug Smith; Wiley Rein, Records Manager
The risks associated with spoliation of evidence are causing organizations everywhere to examine their procedures for evidence preservation. This seminar will offer step by step guidance for instituting and maintaining effective legal holds.
When: May 27 2010 2:00 pm
Presenting: David Stevens; Carnegie Mellon University
Storage Professionals today face the daunting task of being able to quickly know where every email, word document and database file lives and how to get it back in a hurry in the event of a catastrophe.
When: May 27 2010 1:00 pm
Presenting: Rick Dales; Proofpoint, VP Product Management, Archiving
Without the right tools in place, collecting, processing, and reviewing electronic data for eDiscovery can be time-consuming, expensive, and expose a business to significant legal risks.
When: May 27 2010 6:00 am
Presenting: Clive Freedman, 3VB
Planning the disclosure exercise in litigation Litigation hold discussions with the other party using a questionnaire to identify categories and locations of documents (Goodale v Ministry of Justice)
When: May 06 2010 1:00 pm
Presenting: Robert Whiteley, Research Director, Forrester; Chris Witeck, Director of Product Management, SonicWall
Join SonicWall and Forrester Research Director, Robert Whiteley to learn how 2010 will usher in a new wave of investment in mobility technologies among savvy enterprises. Robert Whiteley will discuss findings from Forrester's extensive studies into the work habits and mobility needs of information workers, task workers and a growing class of workers - the "mobile wannabe" - who, together, are making up a larger and larger portion of your workforce.
When: Apr 29 2010 12:00 pm
Presenting: Ken Liao; Proofpoint, Encryption Specialist
Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, you need to ensure that your email system can protect sensitive information from improper exposure, while also enabling secure communication your customers, clients and business partners.
When: May 25 2010 8:00am
Presenting: Peter Judge, Editor, eWeek Europe
Join Peter Judge, UK Editor of eWeek Euorpe, hosting a roundtable session to discuss how we can understand the factors behind cloud adoption.
When: May 25 2010 12:00 pm
Presenting: Lynda Stadtmueller, Senior Research Analyst, Stratecast
Private or public? On-prem or hosted? Dedicated or shared? For most businesses, the decision isn't whether to embrace cloud computing, but how to choose the best data center environment for each application.
When: May 25 2010 4:00 pm
Presenting: Mark Carlson, Val Bercovici and Winston Bumpus
Join Mark Carlson as he hosts this panel discussion on Accelerating Cloud Adoption via Standards & Collaboration along with Val Bercovici, Chair of the SNIA CSI Governing Board & Winston Bumpus, President of DMTF
When: May 19 2010 4:00 am
Presenting: Diane Stow, Service Transition Manager, Bank of England
One of the challenges of service management has always been project management and how it fits, or doesn't, with change. How and when should projects engage with Service Management?
When: May 19 2010 12:00 pm
Presenting: Tulio Quinones, Core Media Technologies & Chuck Darst, HP
The reality is-change is complex. In additional to challenges of change in a distributed CAB environment, CMT faced pressures of speed and risk - to be more responsive to business needs and more consistent on risk and impact analysis.
When: May 19 2010 2:00 pm
Presenting: Thomas Dosedel, BlueCross BlueShield & Mike O'Grady, HP
The Infrastructure and interdependencies between resources just keep getting more complex.
When: May 06 2010 6:00 am
Presenting: Steven Furnell, Head of School of Computing, Plymouth University
As more varied and sensitive online services emerge, the requirement to verify user identity is an increasingly common experience for an ever-widening range of participants. This presentation considers the fundamental challenge of authenticating the user and ensuring that the right person is claiming the right identity.
When: May 06 2010 11:00 am
Presenting: David Temoshok; Federal Identity Management GSA, Director
This session will describe the principal components of the Federal Identity Credentialing and Access Management (FICAM) Program, including the associated policy and operational infrastructure.